Re: TPM keys and user presence

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On Sat, 5 Jul 2025, Martin Paljak wrote:

> > The ssh community has rejected many approaches to TPM based keys, so
> > the easiest way to use them is to use gpg-agent (for any 2.4 and up
> > version of gpg) as the ssh agent backend and then simply use the gpg
> > keytotpm command on keys you want to become only TPM accessible.
> 
> Respectfully disagree. You're free to run any ssh-agent, and it makes various hardware elements play along pretty decently (like secretive for mac).
> 
> For TPM2, see here:
> 
> https://github.com/Foxboron/ssh-tpm-agent

There are also ways to do it via PKCS#11, which lets you use the stock
OpenSSH ssh-agent.

> I'd only recommend going down the GPG path if you're already
> established and invested in the GPG infrastructure/setup, but never
> for beginners.

+1

-d
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux